Preview

Blown to Bits Chapter 1 Review

Good Essays
Open Document
Open Document
786 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Blown to Bits Chapter 1 Review
BLOWN TO BITS
CHAPTER 1
Digital explosion
Why Is It Happening, and What Is at Stake?
A chapter REVIEW

Submitted BY:
Earl Von f Lapura

Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.
Due to the bits explosion, the world changed very suddenly. Almost everything is stored in a computer somewhere. Court records, grocery purchases, precious family photos, radio programs… It is all being reduced to zeroes and ones – “bits.” The bits are stashed on disks of home computers and in the data centers of big corporations and government agencies. The disks can hold so many bits that there is no need to pick and choose what gets remembered. So much disk storage is being produced every year that it could be used to record a page of information, every minute or two, about you and every other human being on earth.
Once something is on a computer, it can replicate and move around the world in a heartbeat. Making a million perfect copies takes but an instant – copy of things we want everyone in the world to see, and also copies of things that weren’t meant to be copied at all.
Due to instantaneous transfers, some data leak. Credit card records are supposed to stay locked up in a data warehouse, but escape into the hands of identity thieves. And we sometimes give information away just because we get something back for doing so. A company will give you free phone calls to anywhere in the world—if you don’t mind watching ads for the products its computers hear you talking about.
The book presents 7 ‘koans’ or principles regarding the bits and the effect of it on humanity.
Koan 1: Even though your computer seems to present pictures, texts, songs, and videos, they are all composed of bits. Everything that’s digital are ruled by bits. Even as we speak, bits are flying through the airwaves by our phones.
Koan 2:

You May Also Find These Documents Helpful

  • Good Essays

    In My Computers

    • 501 Words
    • 3 Pages

    I figured out that Alan P. Lightman is trying to show us a new world, the world of computers. Today society ensures their lives to computers, they trust to death that nothing will happen if we save everything to computers. Is it really true?, I believe that computers are turning humans into their own weapon. In a weapon that will kill themselves. What I am trying to say is that if humans continue to reinsuring their lives to computers then everything will be lost. What happened to the old days? We may not be looking bright, but we are destroying the beauty of nature by putting computers as our first priority. It should not be like this and this is what computers are making to humans.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Summary Of Blown To Bits

    • 283 Words
    • 2 Pages

    Chapter three of Blown to Bits is called Ghosts in the Machine. It is about how information that we are not able to see may actually be stored in the computer. This hidden information can be retrieved through various means, depending on how it is hidden. This chapter also discusses how the images can be used to send hidden in images. Finally, they discuss how information stored on old disks can be retrieved, even if you believe that it has been erased.…

    • 283 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Copyright Laws

    • 2082 Words
    • 9 Pages

    Computer programs and cyber space usage has become a major part of our every day lives. Nearly everyone has to use a computer at some point, and for some it may be an all day every day affair. This being the case, every one should be aware of the laws and boundaries of cyber space usage, copyright infringement on shareware, freeware, and computer software programs. Most of the main legal issues that relate to cyberspace can be listed as: tort issues, contract issues, intellectual property issues, criminal law issues, and constitutional restraint and protections, and securities law issues.…

    • 2082 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Sending critical information such as credit card numbers or bank account numbers puts it at risk of being intercepted by hackers or cyber attacks.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 3 Cma110 Unit 4

    • 647 Words
    • 3 Pages

    In the era that we live in, computers hold our very existence by having all of our information saved to them. From pictures of our families, to person documents like tax forms or medical records, almost all of these things are stored in some electronic form. This information is typically stored on computers with only one copy of the information, but what would happen if that computer or multiple computers failed? What would happen to all that important information and memories? In some cases they can be recovered but at a high cost. Most data recovery services can cost up to $2000.00 dollars to recover lost data. This can all be avoided by backing up data periodically.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Also how the internet is growing to a fast speed as is hardly regulated, and how easy is to collect consumer locations, driving habits, fitness habits, these data base is sold to third parties such as…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Going through the three individual courses this week in regards to Data Storage, Security, Recovery and Disposal has given me a new set of eyes on how information flows and is used among an organization’s computer infrastructure. What I found amazing about these processes is just how far we have come in these last few years when it comes to the technology of Digital Data. I will go over the individual topics that show the benefits, but also the drawbacks of such technology the way it is used at my work place, which is one of the largest Financial Institutions in the United States.…

    • 785 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Data has become a prominent source for information about people to be discovered over the past few years. While the collection of personal data is no immediate harm to anyone, it becomes an issue when the data is used for malicious purposes. This includes spying and tracking people based on their internet history. Furthermore, data can be used by police forces to predict crimes and their victims before they occur. Although this may seem like a flawless idea, it can have harmful side-effects, such as removing the opportunity for decisions to be made by the person.…

    • 1537 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Privacy issues are a growing concern of Americans, especially the Internet. The American people are expressing fear about defending their privacy online, but they continue to share more personal data than ever. Personal identifying information is often collected by businesses and stored in different formats, both digital and traditional paper. Meanwhile, data mining and other aggressive information-capturing techniques have become ordinary for businesses large and small. Companies like Facebook, Itunes, Snapchat, Instagram, Twitter, Amazon, Yahoo, banks, hotels and grocery stores store your information and resale it to other companies. States have used the U.S. Constitution as…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Internet privacy can be considered as a subset of computer privacy. Computer privacy consists of the data privacy relating to the avoidance of the improper disclosure of the personally identifiable information collected and stored by websites. The effective sharing of data while protecting the private information is the real challenge.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Privacy can be generally broken down into three categories - physical, organizational and informational (Wikipedia, the Free Encyclopedia, 2008). Possessing privacy is not just about preventing "intrusions into one's physical space or solitude” (Smith, 1994). Instead, rapid advances in technology have propelled the safeguarding of privacy to the next level.…

    • 1111 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Internet Privacy.

    • 1148 Words
    • 5 Pages

    In the past thirty years computer technology has been developing very rapidly. Internet in last decade has revolutionized the way how we conduct our lives and businesses. Internet has become a daily necessity we cannot live without. Development of Internet and wireless technologies together with advancement in miniature technology has made it possible for us to have access the internet on the go. Every year we expect new and more advance models of smart phones, or new more sophisticated window systems, or new and more reliable internet security program in hope that this time advancements in technologies not only help to improve our life, but help to protect our privacy while using the internet. It seems the more advance computer and internet technologies get, the more our privacy gets violated. There is a parallel connection between internet privacy and advancements in computer technologies. Future of computer and digital technology is unlimited, and it is impossible to predict. However we should recognize the consequences of using the internet for different aspects of our lives, this will in turn help us to understand internet privacy and how to protect our privacy. Until then violation of the internet privacy will increase, and it is okay because we all learn in a process.…

    • 1148 Words
    • 5 Pages
    Good Essays